[{"_id":"54383","user_id":"38188","department":[{"_id":"150"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2024-05-21T13:42:19Z","date_created":"2024-05-21T13:42:08Z","supervisor":[{"first_name":"Moritz Johannes","last_name":"Rüther","full_name":"Rüther, Moritz Johannes","id":"38188"},{"full_name":"Schmid, Hans-Joachim","id":"464","orcid":"000-0001-8590-1921","last_name":"Schmid","first_name":"Hans-Joachim"}],"author":[{"full_name":"Man, Yunhao","last_name":"Man","first_name":"Yunhao"}],"title":"Beeinflussung der Fließeigenschaften von Lasersinterpulver mittels Fließhilfsmitteln","year":"2021","citation":{"bibtex":"@book{Man_2021, title={Beeinflussung der Fließeigenschaften von Lasersinterpulver mittels Fließhilfsmitteln}, author={Man, Yunhao}, year={2021} }","short":"Y. Man, Beeinflussung Der Fließeigenschaften von Lasersinterpulver Mittels Fließhilfsmitteln, 2021.","mla":"Man, Yunhao. <i>Beeinflussung Der Fließeigenschaften von Lasersinterpulver Mittels Fließhilfsmitteln</i>. 2021.","apa":"Man, Y. (2021). <i>Beeinflussung der Fließeigenschaften von Lasersinterpulver mittels Fließhilfsmitteln</i>.","ieee":"Y. Man, <i>Beeinflussung der Fließeigenschaften von Lasersinterpulver mittels Fließhilfsmitteln</i>. 2021.","chicago":"Man, Yunhao. <i>Beeinflussung Der Fließeigenschaften von Lasersinterpulver Mittels Fließhilfsmitteln</i>, 2021.","ama":"Man Y. <i>Beeinflussung Der Fließeigenschaften von Lasersinterpulver Mittels Fließhilfsmitteln</i>.; 2021."}},{"year":"2021","citation":{"apa":"Seuthe, J. (2021). <i>Wärmebehandlung von Polymeren zum Modifizieren von Materialeigenschaften für das Selektive Lasersintern</i>.","short":"J. Seuthe, Wärmebehandlung von Polymeren Zum Modifizieren von Materialeigenschaften Für Das Selektive Lasersintern, 2021.","mla":"Seuthe, Jan. <i>Wärmebehandlung von Polymeren Zum Modifizieren von Materialeigenschaften Für Das Selektive Lasersintern</i>. 2021.","bibtex":"@book{Seuthe_2021, title={Wärmebehandlung von Polymeren zum Modifizieren von Materialeigenschaften für das Selektive Lasersintern}, author={Seuthe, Jan}, year={2021} }","ieee":"J. Seuthe, <i>Wärmebehandlung von Polymeren zum Modifizieren von Materialeigenschaften für das Selektive Lasersintern</i>. 2021.","chicago":"Seuthe, Jan. <i>Wärmebehandlung von Polymeren Zum Modifizieren von Materialeigenschaften Für Das Selektive Lasersintern</i>, 2021.","ama":"Seuthe J. <i>Wärmebehandlung von Polymeren Zum Modifizieren von Materialeigenschaften Für Das Selektive Lasersintern</i>.; 2021."},"title":"Wärmebehandlung von Polymeren zum Modifizieren von Materialeigenschaften für das Selektive Lasersintern","date_updated":"2024-05-21T13:46:21Z","date_created":"2024-05-21T13:43:09Z","author":[{"last_name":"Seuthe","full_name":"Seuthe, Jan","first_name":"Jan"}],"supervisor":[{"full_name":"Rüther, Moritz Johannes","id":"38188","last_name":"Rüther","first_name":"Moritz Johannes"},{"orcid":"000-0001-8590-1921","last_name":"Schmid","full_name":"Schmid, Hans-Joachim","id":"464","first_name":"Hans-Joachim"}],"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"54384","department":[{"_id":"150"}],"user_id":"38188"},{"type":"mastersthesis","status":"public","_id":"54385","department":[{"_id":"150"}],"user_id":"38188","language":[{"iso":"eng"}],"year":"2021","citation":{"chicago":"Ewe, Frederik. <i>Fließfähigkeit von Schüttgütern Bei Erhöhten Temperaturen (Studienarbeit)</i>, 2021.","ieee":"F. Ewe, <i>Fließfähigkeit von Schüttgütern bei erhöhten Temperaturen (Studienarbeit)</i>. 2021.","ama":"Ewe F. <i>Fließfähigkeit von Schüttgütern Bei Erhöhten Temperaturen (Studienarbeit)</i>.; 2021.","apa":"Ewe, F. (2021). <i>Fließfähigkeit von Schüttgütern bei erhöhten Temperaturen (Studienarbeit)</i>.","short":"F. Ewe, Fließfähigkeit von Schüttgütern Bei Erhöhten Temperaturen (Studienarbeit), 2021.","mla":"Ewe, Frederik. <i>Fließfähigkeit von Schüttgütern Bei Erhöhten Temperaturen (Studienarbeit)</i>. 2021.","bibtex":"@book{Ewe_2021, title={Fließfähigkeit von Schüttgütern bei erhöhten Temperaturen (Studienarbeit)}, author={Ewe, Frederik}, year={2021} }"},"date_updated":"2024-05-21T13:46:25Z","author":[{"first_name":"Frederik","full_name":"Ewe, Frederik","last_name":"Ewe"}],"date_created":"2024-05-21T13:46:11Z","supervisor":[{"first_name":"Moritz Johannes","full_name":"Rüther, Moritz Johannes","id":"38188","last_name":"Rüther"},{"id":"464","full_name":"Schmid, Hans-Joachim","last_name":"Schmid","orcid":"000-0001-8590-1921","first_name":"Hans-Joachim"}],"title":"Fließfähigkeit von Schüttgütern bei erhöhten Temperaturen (Studienarbeit)"},{"user_id":"22109","department":[{"_id":"151"}],"_id":"27508","language":[{"iso":"eng"}],"type":"journal_article","publication":"Vehicles","status":"public","abstract":[{"text":"<jats:p>To analyze the influence of suspension kinematics on tire wear, detailed simulation models are required. In this study, a non-linear, flexible multibody model of a rear axle system is built up in the simulation software MSC Adams/View. The physical model comprises the suspension kinematics, compliance, and dynamics as well as the non-linear behavior of the tire using the FTire model. FTire is chosen because it has a separate tire tread model to compute the contact pressure and friction force distribution in the tire contact patch. To build up the simulation model, a large amount of data is needed. Bushings, spring, and damper characteristics are modeled based on measurements. For the structural components (e.g., control arms), reverse engineering techniques are used. The components are 3D-scanned, reworked, and included as a modal reduced finite element (FE)-model using component mode synthesis by Craig–Bampton. Finally, the suspension model is validated by comparing the simulated kinematic and compliance characteristics to experimental results. To investigate the interaction of suspension kinematics and tire wear, straight line driving events, such as acceleration, driving with constant velocity, and deceleration, are simulated with different setups of wheel suspension kinematics. The influence of the setups on the resulting friction work between tire and road is examined, and an exemplarily calculation of tire wear based on a validated FTire tire model is carried out. The results demonstrate, on the one hand, that the chosen concept of elasto-kinematic axle leads to a relatively good match with experimental results and, on the other hand, that there are significant possibilities to reduce tire wear by adjusting the suspension kinematics.</jats:p>","lang":"eng"}],"author":[{"first_name":"Jan","orcid":"0000-0001-9025-9742","last_name":"Schütte","full_name":"Schütte, Jan","id":"22109"},{"first_name":"Walter","last_name":"Sextro","full_name":"Sextro, Walter","id":"21220"}],"date_created":"2021-11-17T09:47:49Z","oa":"1","date_updated":"2024-05-27T07:49:17Z","main_file_link":[{"open_access":"1","url":"https://www.mdpi.com/2624-8921/3/2/15"}],"doi":"10.3390/vehicles3020015","title":"Tire Wear Reduction Based on an Extended Multibody Rear Axle Model","publication_status":"published","quality_controlled":"1","publication_identifier":{"issn":["2624-8921"]},"citation":{"apa":"Schütte, J., &#38; Sextro, W. (2021). Tire Wear Reduction Based on an Extended Multibody Rear Axle Model. <i>Vehicles</i>, 233–256. <a href=\"https://doi.org/10.3390/vehicles3020015\">https://doi.org/10.3390/vehicles3020015</a>","bibtex":"@article{Schütte_Sextro_2021, title={Tire Wear Reduction Based on an Extended Multibody Rear Axle Model}, DOI={<a href=\"https://doi.org/10.3390/vehicles3020015\">10.3390/vehicles3020015</a>}, journal={Vehicles}, author={Schütte, Jan and Sextro, Walter}, year={2021}, pages={233–256} }","mla":"Schütte, Jan, and Walter Sextro. “Tire Wear Reduction Based on an Extended Multibody Rear Axle Model.” <i>Vehicles</i>, 2021, pp. 233–56, doi:<a href=\"https://doi.org/10.3390/vehicles3020015\">10.3390/vehicles3020015</a>.","short":"J. Schütte, W. Sextro, Vehicles (2021) 233–256.","ieee":"J. Schütte and W. Sextro, “Tire Wear Reduction Based on an Extended Multibody Rear Axle Model,” <i>Vehicles</i>, pp. 233–256, 2021, doi: <a href=\"https://doi.org/10.3390/vehicles3020015\">10.3390/vehicles3020015</a>.","chicago":"Schütte, Jan, and Walter Sextro. “Tire Wear Reduction Based on an Extended Multibody Rear Axle Model.” <i>Vehicles</i>, 2021, 233–56. <a href=\"https://doi.org/10.3390/vehicles3020015\">https://doi.org/10.3390/vehicles3020015</a>.","ama":"Schütte J, Sextro W. Tire Wear Reduction Based on an Extended Multibody Rear Axle Model. <i>Vehicles</i>. Published online 2021:233-256. doi:<a href=\"https://doi.org/10.3390/vehicles3020015\">10.3390/vehicles3020015</a>"},"page":"233-256","year":"2021"},{"citation":{"apa":"Janus, R. (2021). Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a. In M. Schult (Ed.), <i>Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1</i> (pp. 234–239). Evangelischer Verlagsanstalt.","bibtex":"@inbook{Janus_2021, place={Leipzig}, title={Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a}, booktitle={Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1}, publisher={Evangelischer Verlagsanstalt}, author={Janus, Richard}, editor={Schult, Maike}, year={2021}, pages={234–239} }","short":"R. Janus, in: M. Schult (Ed.), Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1, Evangelischer Verlagsanstalt, Leipzig, 2021, pp. 234–239.","mla":"Janus, Richard. “Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a.” <i>Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1</i>, edited by Maike Schult, Evangelischer Verlagsanstalt, 2021, pp. 234–39.","ama":"Janus R. Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a. In: Schult M, ed. <i>Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1</i>. Evangelischer Verlagsanstalt; 2021:234-239.","chicago":"Janus, Richard. “Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a.” In <i>Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1</i>, edited by Maike Schult, 234–39. Leipzig: Evangelischer Verlagsanstalt, 2021.","ieee":"R. Janus, “Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a,” in <i>Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1</i>, M. Schult, Ed. Leipzig: Evangelischer Verlagsanstalt, 2021, pp. 234–239."},"page":"234-239","place":"Leipzig","year":"2021","publication_status":"published","title":"Jubilate (08.05.2022): 1. Mose 1,1-4a.26-28.31a; 2, 1-4a","date_created":"2024-05-16T11:22:35Z","author":[{"orcid":"https://orcid.org/0009-0006-0365-4546","last_name":"Janus","full_name":"Janus, Richard","id":"31047","first_name":"Richard"}],"publisher":"Evangelischer Verlagsanstalt","date_updated":"2024-05-27T14:42:29Z","status":"public","editor":[{"last_name":"Schult","full_name":"Schult, Maike","first_name":"Maike"}],"type":"book_chapter","publication":"Er ist unser Friede. Lesepredigten 1. Advent 2021 bis Pfingstmontag 2022. Textreihe IV/1","language":[{"iso":"ger"}],"user_id":"31047","department":[{"_id":"36"},{"_id":"20"},{"_id":"500"}],"_id":"54307"},{"date_created":"2022-01-12T10:27:02Z","author":[{"orcid":"0000-0003-0215-1278","last_name":"Zahera","id":"72768","full_name":"Zahera, Hamada Mohamed Abdelsamee","first_name":"Hamada Mohamed Abdelsamee"},{"first_name":"Stefan","id":"11871","full_name":"Heindorf, Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf"},{"first_name":"Axel-Cyrille","last_name":"Ngonga Ngomo","full_name":"Ngonga Ngomo, Axel-Cyrille"}],"date_updated":"2024-05-30T18:02:43Z","oa":"1","publisher":"ACM","doi":"10.1145/3460210.3493563","main_file_link":[{"open_access":"1","url":"https://papers.dice-research.org/2021/KCAP2021_ASSET/public.pdf"}],"title":"ASSET: A Semi-supervised Approach for Entity Typing in Knowledge Graphs","has_accepted_license":"1","publication_status":"published","citation":{"apa":"Zahera, H. M. A., Heindorf, S., &#38; Ngonga Ngomo, A.-C. (2021). ASSET: A Semi-supervised Approach for Entity Typing in Knowledge Graphs. <i>Proceedings of the 11th on Knowledge Capture Conference</i>. <a href=\"https://doi.org/10.1145/3460210.3493563\">https://doi.org/10.1145/3460210.3493563</a>","bibtex":"@inproceedings{Zahera_Heindorf_Ngonga Ngomo_2021, title={ASSET: A Semi-supervised Approach for Entity Typing in Knowledge Graphs}, DOI={<a href=\"https://doi.org/10.1145/3460210.3493563\">10.1145/3460210.3493563</a>}, booktitle={Proceedings of the 11th on Knowledge Capture Conference}, publisher={ACM}, author={Zahera, Hamada Mohamed Abdelsamee and Heindorf, Stefan and Ngonga Ngomo, Axel-Cyrille}, year={2021} }","mla":"Zahera, Hamada Mohamed Abdelsamee, et al. “ASSET: A Semi-Supervised Approach for Entity Typing in Knowledge Graphs.” <i>Proceedings of the 11th on Knowledge Capture Conference</i>, ACM, 2021, doi:<a href=\"https://doi.org/10.1145/3460210.3493563\">10.1145/3460210.3493563</a>.","short":"H.M.A. Zahera, S. Heindorf, A.-C. Ngonga Ngomo, in: Proceedings of the 11th on Knowledge Capture Conference, ACM, 2021.","ama":"Zahera HMA, Heindorf S, Ngonga Ngomo A-C. ASSET: A Semi-supervised Approach for Entity Typing in Knowledge Graphs. In: <i>Proceedings of the 11th on Knowledge Capture Conference</i>. ACM; 2021. doi:<a href=\"https://doi.org/10.1145/3460210.3493563\">10.1145/3460210.3493563</a>","ieee":"H. M. A. Zahera, S. Heindorf, and A.-C. Ngonga Ngomo, “ASSET: A Semi-supervised Approach for Entity Typing in Knowledge Graphs,” 2021, doi: <a href=\"https://doi.org/10.1145/3460210.3493563\">10.1145/3460210.3493563</a>.","chicago":"Zahera, Hamada Mohamed Abdelsamee, Stefan Heindorf, and Axel-Cyrille Ngonga Ngomo. “ASSET: A Semi-Supervised Approach for Entity Typing in Knowledge Graphs.” In <i>Proceedings of the 11th on Knowledge Capture Conference</i>. ACM, 2021. <a href=\"https://doi.org/10.1145/3460210.3493563\">https://doi.org/10.1145/3460210.3493563</a>."},"year":"2021","department":[{"_id":"574"}],"user_id":"11871","_id":"29291","language":[{"iso":"eng"}],"file_date_updated":"2024-05-30T18:02:28Z","ddc":["000"],"publication":"Proceedings of the 11th on Knowledge Capture Conference","type":"conference","status":"public","file":[{"file_size":537882,"file_id":"54523","access_level":"closed","file_name":"ASSET_public.pdf","date_updated":"2024-05-30T18:02:28Z","creator":"heindorf","date_created":"2024-05-30T18:02:28Z","success":1,"relation":"main_file","content_type":"application/pdf"}]},{"language":[{"iso":"eng"}],"user_id":"98948","department":[{"_id":"792"}],"_id":"49463","status":"public","type":"journal_article","publication":"Computers & Security","title":"Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour","date_created":"2023-12-04T13:37:54Z","author":[{"full_name":"Trang, Simon Thanh-Nam","id":"98948","last_name":"Trang","orcid":"0000-0002-4784-4038","first_name":"Simon Thanh-Nam"},{"first_name":"I.","last_name":"Nastjuk","full_name":"Nastjuk, I."}],"volume":104,"date_updated":"2024-06-04T09:50:41Z","citation":{"chicago":"Trang, Simon Thanh-Nam, and I. Nastjuk. “Examining the Role of Stress and Information Security Policy Design in Information Security Compliance Behaviour: An Experimental Study of in-Task Behaviour.” <i>Computers &#38; Security</i> 104 (2021).","ieee":"S. T.-N. Trang and I. Nastjuk, “Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour,” <i>Computers &#38; Security</i>, vol. 104, 2021.","ama":"Trang ST-N, Nastjuk I. Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. <i>Computers &#38; Security</i>. 2021;104.","bibtex":"@article{Trang_Nastjuk_2021, title={Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour}, volume={104}, journal={Computers &#38; Security}, author={Trang, Simon Thanh-Nam and Nastjuk, I.}, year={2021} }","short":"S.T.-N. Trang, I. Nastjuk, Computers &#38; Security 104 (2021).","mla":"Trang, Simon Thanh-Nam, and I. Nastjuk. “Examining the Role of Stress and Information Security Policy Design in Information Security Compliance Behaviour: An Experimental Study of in-Task Behaviour.” <i>Computers &#38; Security</i>, vol. 104, 2021.","apa":"Trang, S. T.-N., &#38; Nastjuk, I. (2021). Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. <i>Computers &#38; Security</i>, <i>104</i>."},"intvolume":"       104","year":"2021"},{"title":"The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information?","volume":116,"author":[{"orcid":"0000-0002-4784-4038","last_name":"Trang","full_name":"Trang, Simon Thanh-Nam","id":"98948","first_name":"Simon Thanh-Nam"},{"first_name":"W.","last_name":"Weiger","full_name":"Weiger, W."}],"date_created":"2023-12-04T13:38:05Z","date_updated":"2024-06-04T09:50:02Z","intvolume":"       116","citation":{"chicago":"Trang, Simon Thanh-Nam, and W. Weiger. “The Perils of Gamification: Does Engaging with Gamified Services Increase Users’ Willingness to Disclose Personal Information?” <i>Computers in Human Behavior</i> 116 (2021).","ieee":"S. T.-N. Trang and W. Weiger, “The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information?,” <i>Computers in Human Behavior</i>, vol. 116, 2021.","apa":"Trang, S. T.-N., &#38; Weiger, W. (2021). The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information? <i>Computers in Human Behavior</i>, <i>116</i>.","ama":"Trang ST-N, Weiger W. The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information? <i>Computers in Human Behavior</i>. 2021;116.","short":"S.T.-N. Trang, W. Weiger, Computers in Human Behavior 116 (2021).","bibtex":"@article{Trang_Weiger_2021, title={The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information?}, volume={116}, journal={Computers in Human Behavior}, author={Trang, Simon Thanh-Nam and Weiger, W.}, year={2021} }","mla":"Trang, Simon Thanh-Nam, and W. Weiger. “The Perils of Gamification: Does Engaging with Gamified Services Increase Users’ Willingness to Disclose Personal Information?” <i>Computers in Human Behavior</i>, vol. 116, 2021."},"year":"2021","language":[{"iso":"eng"}],"department":[{"_id":"792"}],"user_id":"98948","_id":"49464","status":"public","publication":"Computers in Human Behavior","type":"journal_article"},{"publication":"HMD Praxis der Wirtschaftsinformatik","type":"journal_article","status":"public","department":[{"_id":"792"}],"user_id":"98948","_id":"49462","language":[{"iso":"eng"}],"intvolume":"        58","page":"698–711","citation":{"bibtex":"@article{Brendel_Greve_Masuch_Trang_2021, title={Corona Tracing Apps – Eine Analyse und Strukturierung des europäischen Marktes}, volume={58}, journal={HMD Praxis der Wirtschaftsinformatik}, author={Brendel, A.B. and Greve, M. and Masuch, K. and Trang, Simon Thanh-Nam}, year={2021}, pages={698–711} }","short":"A.B. Brendel, M. Greve, K. Masuch, S.T.-N. Trang, HMD Praxis Der Wirtschaftsinformatik 58 (2021) 698–711.","mla":"Brendel, A. B., et al. “Corona Tracing Apps – Eine Analyse Und Strukturierung Des Europäischen Marktes.” <i>HMD Praxis Der Wirtschaftsinformatik</i>, vol. 58, 2021, pp. 698–711.","apa":"Brendel, A. B., Greve, M., Masuch, K., &#38; Trang, S. T.-N. (2021). Corona Tracing Apps – Eine Analyse und Strukturierung des europäischen Marktes. <i>HMD Praxis Der Wirtschaftsinformatik</i>, <i>58</i>, 698–711.","ama":"Brendel AB, Greve M, Masuch K, Trang ST-N. Corona Tracing Apps – Eine Analyse und Strukturierung des europäischen Marktes. <i>HMD Praxis der Wirtschaftsinformatik</i>. 2021;58:698–711.","ieee":"A. B. Brendel, M. Greve, K. Masuch, and S. T.-N. Trang, “Corona Tracing Apps – Eine Analyse und Strukturierung des europäischen Marktes,” <i>HMD Praxis der Wirtschaftsinformatik</i>, vol. 58, pp. 698–711, 2021.","chicago":"Brendel, A.B., M. Greve, K. Masuch, and Simon Thanh-Nam Trang. “Corona Tracing Apps – Eine Analyse Und Strukturierung Des Europäischen Marktes.” <i>HMD Praxis Der Wirtschaftsinformatik</i> 58 (2021): 698–711."},"year":"2021","volume":58,"author":[{"first_name":"A.B.","full_name":"Brendel, A.B.","last_name":"Brendel"},{"first_name":"M.","full_name":"Greve, M.","last_name":"Greve"},{"last_name":"Masuch","full_name":"Masuch, K.","first_name":"K."},{"first_name":"Simon Thanh-Nam","full_name":"Trang, Simon Thanh-Nam","id":"98948","orcid":"0000-0002-4784-4038","last_name":"Trang"}],"date_created":"2023-12-04T13:37:49Z","date_updated":"2024-06-04T09:51:15Z","title":"Corona Tracing Apps – Eine Analyse und Strukturierung des europäischen Marktes"},{"date_updated":"2024-06-04T12:24:52Z","publisher":"Springer International Publishing","author":[{"full_name":"Manzoor, Ali","id":"77309","last_name":"Manzoor","first_name":"Ali"},{"full_name":"Saleem, Muhammad","last_name":"Saleem","first_name":"Muhammad"},{"full_name":"Ngonga Ngomo, Axel-Cyrille","id":"65716","last_name":"Ngonga Ngomo","first_name":"Axel-Cyrille"}],"date_created":"2024-06-04T12:23:21Z","title":"Unsupervised Relation Extraction Using Sentence Encoding","doi":"10.1007/978-3-030-80418-3_25","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030804176","9783030804183"]},"publication_status":"published","year":"2021","place":"Cham","citation":{"apa":"Manzoor, A., Saleem, M., &#38; Ngonga Ngomo, A.-C. (2021). Unsupervised Relation Extraction Using Sentence Encoding. In <i>The Semantic Web: ESWC 2021 Satellite Events</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-80418-3_25\">https://doi.org/10.1007/978-3-030-80418-3_25</a>","bibtex":"@inbook{Manzoor_Saleem_Ngonga Ngomo_2021, place={Cham}, title={Unsupervised Relation Extraction Using Sentence Encoding}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-80418-3_25\">10.1007/978-3-030-80418-3_25</a>}, booktitle={The Semantic Web: ESWC 2021 Satellite Events}, publisher={Springer International Publishing}, author={Manzoor, Ali and Saleem, Muhammad and Ngonga Ngomo, Axel-Cyrille}, year={2021} }","short":"A. Manzoor, M. Saleem, A.-C. Ngonga Ngomo, in: The Semantic Web: ESWC 2021 Satellite Events, Springer International Publishing, Cham, 2021.","mla":"Manzoor, Ali, et al. “Unsupervised Relation Extraction Using Sentence Encoding.” <i>The Semantic Web: ESWC 2021 Satellite Events</i>, Springer International Publishing, 2021, doi:<a href=\"https://doi.org/10.1007/978-3-030-80418-3_25\">10.1007/978-3-030-80418-3_25</a>.","ama":"Manzoor A, Saleem M, Ngonga Ngomo A-C. Unsupervised Relation Extraction Using Sentence Encoding. In: <i>The Semantic Web: ESWC 2021 Satellite Events</i>. Springer International Publishing; 2021. doi:<a href=\"https://doi.org/10.1007/978-3-030-80418-3_25\">10.1007/978-3-030-80418-3_25</a>","ieee":"A. Manzoor, M. Saleem, and A.-C. Ngonga Ngomo, “Unsupervised Relation Extraction Using Sentence Encoding,” in <i>The Semantic Web: ESWC 2021 Satellite Events</i>, Cham: Springer International Publishing, 2021.","chicago":"Manzoor, Ali, Muhammad Saleem, and Axel-Cyrille Ngonga Ngomo. “Unsupervised Relation Extraction Using Sentence Encoding.” In <i>The Semantic Web: ESWC 2021 Satellite Events</i>. Cham: Springer International Publishing, 2021. <a href=\"https://doi.org/10.1007/978-3-030-80418-3_25\">https://doi.org/10.1007/978-3-030-80418-3_25</a>."},"_id":"54586","department":[{"_id":"574"}],"user_id":"77309","language":[{"iso":"eng"}],"publication":"The Semantic Web: ESWC 2021 Satellite Events","type":"book_chapter","status":"public"},{"user_id":"99353","department":[{"_id":"574"}],"_id":"45844","extern":"1","type":"journal_article","status":"public","author":[{"full_name":"Mahmood, Yasir","last_name":"Mahmood","first_name":"Yasir"},{"first_name":"Arne","full_name":"Meier, Arne","last_name":"Meier"},{"first_name":"Johannes","last_name":"Schmidt","full_name":"Schmidt, Johannes"}],"volume":31,"date_updated":"2024-06-04T16:03:14Z","doi":"10.1093/logcom/exaa079","publication_status":"published","publication_identifier":{"issn":["0955-792X","1465-363X"]},"citation":{"apa":"Mahmood, Y., Meier, A., &#38; Schmidt, J. (2021). Parameterized complexity of abduction in Schaefer’s framework. <i>Journal of Logic and Computation</i>, <i>31</i>(1), 266–296. <a href=\"https://doi.org/10.1093/logcom/exaa079\">https://doi.org/10.1093/logcom/exaa079</a>","mla":"Mahmood, Yasir, et al. “Parameterized Complexity of Abduction in Schaefer’s Framework.” <i>Journal of Logic and Computation</i>, vol. 31, no. 1, Oxford University Press (OUP), 2021, pp. 266–96, doi:<a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>.","bibtex":"@article{Mahmood_Meier_Schmidt_2021, title={Parameterized complexity of abduction in Schaefer’s framework}, volume={31}, DOI={<a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>}, number={1}, journal={Journal of Logic and Computation}, publisher={Oxford University Press (OUP)}, author={Mahmood, Yasir and Meier, Arne and Schmidt, Johannes}, year={2021}, pages={266–296} }","short":"Y. Mahmood, A. Meier, J. Schmidt, Journal of Logic and Computation 31 (2021) 266–296.","ieee":"Y. Mahmood, A. Meier, and J. Schmidt, “Parameterized complexity of abduction in Schaefer’s framework,” <i>Journal of Logic and Computation</i>, vol. 31, no. 1, pp. 266–296, 2021, doi: <a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>.","chicago":"Mahmood, Yasir, Arne Meier, and Johannes Schmidt. “Parameterized Complexity of Abduction in Schaefer’s Framework.” <i>Journal of Logic and Computation</i> 31, no. 1 (2021): 266–96. <a href=\"https://doi.org/10.1093/logcom/exaa079\">https://doi.org/10.1093/logcom/exaa079</a>.","ama":"Mahmood Y, Meier A, Schmidt J. Parameterized complexity of abduction in Schaefer’s framework. <i>Journal of Logic and Computation</i>. 2021;31(1):266-296. doi:<a href=\"https://doi.org/10.1093/logcom/exaa079\">10.1093/logcom/exaa079</a>"},"intvolume":"        31","page":"266-296","language":[{"iso":"eng"}],"keyword":["Logic","Hardware and Architecture","Arts and Humanities (miscellaneous)","Software","Theoretical Computer Science"],"publication":"Journal of Logic and Computation","abstract":[{"text":"<jats:title>Abstract</jats:title>\r\n               <jats:p>Abductive reasoning is a non-monotonic formalism stemming from the work of Peirce. It describes the process of deriving the most plausible explanations of known facts. Considering the positive version, asking for sets of variables as explanations, we study, besides the problem of wether there exists a set of explanations, two explanation size limited variants of this reasoning problem (less than or equal to, and equal to a given size bound). In this paper, we present a thorough two-dimensional classification of these problems: the first dimension is regarding the parameterized complexity under a wealth of different parameterizations, and the second dimension spans through all possible Boolean fragments of these problems in Schaefer’s constraint satisfaction framework with co-clones (T. J. Schaefer. The complexity of satisfiability problems. In Proceedings of the 10th Annual ACM Symposium on Theory of Computing, May 1–3, 1978, San Diego, California, USA, R.J. Lipton, W.A. Burkhard, W.J. Savitch, E.P. Friedman, A.V. Aho eds, pp. 216–226. ACM, 1978). Thereby, we almost complete the parameterized complexity classification program initiated by Fellows et al. (The parameterized complexity of abduction. In Proceedings of the Twenty-Sixth AAAI Conference on Articial Intelligence, July 22–26, 2012, Toronto, Ontario, Canada, J. Homann, B. Selman eds. AAAI Press, 2012), partially building on the results by Nordh and Zanuttini (What makes propositional abduction tractable. Artificial Intelligence, 172, 1245–1284, 2008). In this process, we outline a fine-grained analysis of the inherent parameterized intractability of these problems and pinpoint their FPT parts. As the standard algebraic approach is not applicable to our problems, we develop an alternative method that makes the algebraic tools partially available again.</jats:p>","lang":"eng"}],"date_created":"2023-07-03T11:35:23Z","publisher":"Oxford University Press (OUP)","title":"Parameterized complexity of abduction in Schaefer’s framework","issue":"1","year":"2021"},{"year":"2021","page":"1235–1252","citation":{"ama":"Huaman N, von Skarczinski B, Stransky C, et al. A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:1235–1252.","apa":"Huaman, N., von Skarczinski, B., Stransky, C., Wermke, D., Acar, Y., Dreißigacker, A., &#38; Fahl, S. (2021). A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 1235–1252). USENIX Association.","short":"N. Huaman, B. von Skarczinski, C. Stransky, D. Wermke, Y. Acar, A. Dreißigacker, S. Fahl, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 1235–1252.","mla":"Huaman, Nicolas, et al. “A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-Sized Enterprises.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 1235–1252.","bibtex":"@inproceedings{Huaman_von Skarczinski_Stransky_Wermke_Acar_Dreißigacker_Fahl_2021, title={A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Huaman, Nicolas and von Skarczinski, Bennet and Stransky, Christian and Wermke, Dominik and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={1235–1252} }","chicago":"Huaman, Nicolas, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, and Sascha Fahl. “A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-Sized Enterprises.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 1235–1252. USENIX Association, 2021.","ieee":"N. Huaman <i>et al.</i>, “A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 1235–1252."},"title":"A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises","publisher":"USENIX Association","date_updated":"2024-06-05T12:57:43Z","date_created":"2023-09-22T13:02:54Z","author":[{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"full_name":"von Skarczinski, Bennet","last_name":"von Skarczinski","first_name":"Bennet"},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Arne","last_name":"Dreißigacker","full_name":"Dreißigacker, Arne"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"editor":[{"first_name":"Michael","last_name":"Bailey","full_name":"Bailey, Michael"},{"last_name":"Greenstadt","full_name":"Greenstadt, Rachel","first_name":"Rachel"}],"status":"public","publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","type":"conference","extern":"1","language":[{"iso":"eng"}],"_id":"47265","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931"},{"status":"public","editor":[{"full_name":"Chiasson, Sonia","last_name":"Chiasson","first_name":"Sonia"}],"publication":"Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021","type":"conference","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47268","page":"437–454","citation":{"ieee":"C. Stransky <i>et al.</i>, “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security,” in <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 437–454.","chicago":"Stransky, Christian, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” In <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, 437–454. USENIX Association, 2021.","ama":"Stransky C, Wermke D, Schrader J, et al. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:437–454.","apa":"Stransky, C., Wermke, D., Schrader, J., Huaman, N., Acar, Y., Fehlhaber, A. L., Wei, M., Ur, B., &#38; Fahl, S. (2021). On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In S. Chiasson (Ed.), <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp. 437–454). USENIX Association.","bibtex":"@inproceedings{Stransky_Wermke_Schrader_Huaman_Acar_Fehlhaber_Wei_Ur_Fahl_2021, title={On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security}, booktitle={Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association}, author={Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha}, editor={Chiasson, Sonia}, year={2021}, pages={437–454} }","mla":"Stransky, Christian, et al. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 437–454.","short":"C. Stransky, D. Wermke, J. Schrader, N. Huaman, Y. Acar, A.L. Fehlhaber, M. Wei, B. Ur, S. Fahl, in: S. Chiasson (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021, USENIX Association, 2021, pp. 437–454."},"year":"2021","title":"On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security","author":[{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Schrader, Johanna","last_name":"Schrader","first_name":"Johanna"},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Anna Lena","last_name":"Fehlhaber","full_name":"Fehlhaber, Anna Lena"},{"first_name":"Miranda","full_name":"Wei, Miranda","last_name":"Wei"},{"first_name":"Blase","last_name":"Ur","full_name":"Ur, Blase"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T13:04:56Z","publisher":"USENIX Association","date_updated":"2024-06-05T13:02:20Z"},{"year":"2021","citation":{"chicago":"Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha Fahl. “They Would Do Better If They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.” In <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2021. <a href=\"https://doi.org/10.1109/sp40001.2021.00094\">https://doi.org/10.1109/sp40001.2021.00094</a>.","ieee":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites,” 2021, doi: <a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>.","ama":"Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. In: <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2021. doi:<a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>","short":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, in: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, 2021.","bibtex":"@inproceedings{Huaman_Amft_Oltrogge_Acar_Fahl_2021, title={They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites}, DOI={<a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>}, booktitle={2021 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha}, year={2021} }","mla":"Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.” <i>2021 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>.","apa":"Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2021). They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp40001.2021.00094\">https://doi.org/10.1109/sp40001.2021.00094</a>"},"publication_status":"published","title":"They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites","doi":"10.1109/sp40001.2021.00094","date_updated":"2024-06-05T13:02:40Z","publisher":"IEEE","date_created":"2023-09-22T13:04:10Z","author":[{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"first_name":"Marten","last_name":"Oltrogge","full_name":"Oltrogge, Marten"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"status":"public","publication":"2021 IEEE Symposium on Security and Privacy (SP)","type":"conference","extern":"1","language":[{"iso":"eng"}],"_id":"47267","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931"},{"publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","type":"conference","status":"public","editor":[{"first_name":"Michael","last_name":"Bailey","full_name":"Bailey, Michael"},{"full_name":"Greenstadt, Rachel","last_name":"Greenstadt","first_name":"Rachel"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47266","language":[{"iso":"eng"}],"extern":"1","page":"411–428","citation":{"ama":"Haney JM, Acar Y, Furman S. “It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:411–428.","ieee":"J. M. Haney, Y. Acar, and S. Furman, “‘It’s the Company, the Government, You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 411–428.","chicago":"Haney, Julie M., Yasemin Acar, and Susanne Furman. “‘It’s the Company, the Government, You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 411–428. USENIX Association, 2021.","mla":"Haney, Julie M., et al. “‘It’s the Company, the Government, You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 411–428.","short":"J.M. Haney, Y. Acar, S. Furman, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 411–428.","bibtex":"@inproceedings{Haney_Acar_Furman_2021, title={“It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Haney, Julie M. and Acar, Yasemin and Furman, Susanne}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={411–428} }","apa":"Haney, J. M., Acar, Y., &#38; Furman, S. (2021). “It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 411–428). USENIX Association."},"year":"2021","date_created":"2023-09-22T13:03:50Z","author":[{"full_name":"Haney, Julie M.","last_name":"Haney","first_name":"Julie M."},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Susanne","full_name":"Furman, Susanne","last_name":"Furman"}],"date_updated":"2024-06-05T13:03:16Z","publisher":"USENIX Association","title":"\"It’s the Company, the Government, You and I\": User Perceptions of Responsibility for Smart Home Privacy and Security"},{"status":"public","editor":[{"last_name":"Bailey","full_name":"Bailey, Michael","first_name":"Michael"},{"first_name":"Rachel","last_name":"Greenstadt","full_name":"Greenstadt, Rachel"}],"type":"conference","publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","language":[{"iso":"eng"}],"extern":"1","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47264","citation":{"apa":"Oltrogge, M., Huaman, N., Amft, S., Acar, Y., Backes, M., &#38; Fahl, S. (2021). Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 4347–4364). USENIX Association.","bibtex":"@inproceedings{Oltrogge_Huaman_Amft_Acar_Backes_Fahl_2021, title={Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={4347–4364} }","short":"M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, S. Fahl, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 4347–4364.","mla":"Oltrogge, Marten, et al. “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 4347–4364.","ama":"Oltrogge M, Huaman N, Amft S, Acar Y, Backes M, Fahl S. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:4347–4364.","ieee":"M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, and S. Fahl, “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 4347–4364.","chicago":"Oltrogge, Marten, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 4347–4364. USENIX Association, 2021."},"page":"4347–4364","year":"2021","title":"Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications","date_created":"2023-09-22T13:02:22Z","author":[{"full_name":"Oltrogge, Marten","last_name":"Oltrogge","first_name":"Marten"},{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"publisher":"USENIX Association","date_updated":"2024-06-05T13:01:22Z"},{"publication":"Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021","type":"conference","status":"public","editor":[{"first_name":"Sonia","last_name":"Chiasson","full_name":"Chiasson, Sonia"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47269","language":[{"iso":"eng"}],"extern":"1","page":"359–376","citation":{"apa":"Neil, L., Bouma-Sims, E., Lafontaine, E., Acar, Y., &#38; Reaves, B. (2021). Investigating Web Service Account Remediation Advice. In S. Chiasson (Ed.), <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp. 359–376). USENIX Association.","bibtex":"@inproceedings{Neil_Bouma-Sims_Lafontaine_Acar_Reaves_2021, title={Investigating Web Service Account Remediation Advice}, booktitle={Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association}, author={Neil, Lorenzo and Bouma-Sims, Elijah and Lafontaine, Evan and Acar, Yasemin and Reaves, Bradley}, editor={Chiasson, Sonia}, year={2021}, pages={359–376} }","mla":"Neil, Lorenzo, et al. “Investigating Web Service Account Remediation Advice.” <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 359–376.","short":"L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, B. Reaves, in: S. Chiasson (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021, USENIX Association, 2021, pp. 359–376.","chicago":"Neil, Lorenzo, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley Reaves. “Investigating Web Service Account Remediation Advice.” In <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, 359–376. USENIX Association, 2021.","ieee":"L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, and B. Reaves, “Investigating Web Service Account Remediation Advice,” in <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 359–376.","ama":"Neil L, Bouma-Sims E, Lafontaine E, Acar Y, Reaves B. Investigating Web Service Account Remediation Advice. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:359–376."},"year":"2021","author":[{"last_name":"Neil","full_name":"Neil, Lorenzo","first_name":"Lorenzo"},{"full_name":"Bouma-Sims, Elijah","last_name":"Bouma-Sims","first_name":"Elijah"},{"full_name":"Lafontaine, Evan","last_name":"Lafontaine","first_name":"Evan"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"full_name":"Reaves, Bradley","last_name":"Reaves","first_name":"Bradley"}],"date_created":"2023-09-22T13:05:16Z","date_updated":"2024-06-05T13:03:38Z","publisher":"USENIX Association","title":"Investigating Web Service Account Remediation Advice"},{"citation":{"apa":"Acar, Y. (2021). <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany.","mla":"Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","bibtex":"@book{Acar_2021, title={Human Factors in Secure Software Development}, publisher={University of Marburg, Germany}, author={Acar, Yasemin}, year={2021} }","short":"Y. Acar, Human Factors in Secure Software Development, University of Marburg, Germany, 2021.","ama":"Acar Y. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany; 2021.","chicago":"Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","ieee":"Y. Acar, <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021."},"year":"2021","title":"Human Factors in Secure Software Development","author":[{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"}],"date_created":"2023-09-22T13:06:40Z","date_updated":"2024-06-05T12:56:39Z","publisher":"University of Marburg, Germany","status":"public","type":"dissertation","language":[{"iso":"eng"}],"extern":"1","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47271"},{"page":"1-8","citation":{"short":"R.P. Prager, M. Seiler, H. Trautmann, P. Kerschke, in: 2021 IEEE Symposium Series on Computational Intelligence (SSCI), 2021, pp. 1–8.","bibtex":"@inproceedings{Prager_Seiler_Trautmann_Kerschke_2021, title={Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization}, DOI={<a href=\"https://doi.org/10.1109/SSCI50451.2021.9660174\">10.1109/SSCI50451.2021.9660174</a>}, booktitle={2021 IEEE Symposium Series on Computational Intelligence (SSCI)}, author={Prager, Raphael Patrick and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}, year={2021}, pages={1–8} }","mla":"Prager, Raphael Patrick, et al. “Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization.” <i>2021 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 2021, pp. 1–8, doi:<a href=\"https://doi.org/10.1109/SSCI50451.2021.9660174\">10.1109/SSCI50451.2021.9660174</a>.","apa":"Prager, R. P., Seiler, M., Trautmann, H., &#38; Kerschke, P. (2021). Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization. <i>2021 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 1–8. <a href=\"https://doi.org/10.1109/SSCI50451.2021.9660174\">https://doi.org/10.1109/SSCI50451.2021.9660174</a>","chicago":"Prager, Raphael Patrick, Moritz Seiler, Heike Trautmann, and Pascal Kerschke. “Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization.” In <i>2021 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 1–8, 2021. <a href=\"https://doi.org/10.1109/SSCI50451.2021.9660174\">https://doi.org/10.1109/SSCI50451.2021.9660174</a>.","ieee":"R. P. Prager, M. Seiler, H. Trautmann, and P. Kerschke, “Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization,” in <i>2021 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 2021, pp. 1–8, doi: <a href=\"https://doi.org/10.1109/SSCI50451.2021.9660174\">10.1109/SSCI50451.2021.9660174</a>.","ama":"Prager RP, Seiler M, Trautmann H, Kerschke P. Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization. In: <i>2021 IEEE Symposium Series on Computational Intelligence (SSCI)</i>. ; 2021:1-8. doi:<a href=\"https://doi.org/10.1109/SSCI50451.2021.9660174\">10.1109/SSCI50451.2021.9660174</a>"},"year":"2021","doi":"10.1109/SSCI50451.2021.9660174","title":"Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization","author":[{"full_name":"Prager, Raphael Patrick","last_name":"Prager","first_name":"Raphael Patrick"},{"id":"105520","full_name":"Seiler, Moritz","last_name":"Seiler","first_name":"Moritz"},{"id":"100740","full_name":"Trautmann, Heike","last_name":"Trautmann","orcid":"0000-0002-9788-8282","first_name":"Heike"},{"full_name":"Kerschke, Pascal","last_name":"Kerschke","first_name":"Pascal"}],"date_created":"2023-08-04T07:25:08Z","date_updated":"2024-06-07T07:12:28Z","status":"public","abstract":[{"text":"We propose a novel method for automated algorithm selection in the domain of single-objective continuous black-box optimization. In contrast to existing methods, we use convolutional neural networks as the selection apparatus which bases its decision on a so-called ‘fitness map’. This fitness map is a 2D representation of a two dimensional search space where different gray scales indicate the quality of found solutions in certain areas. Our devised approach uses a modular CMA-ES framework which offers the option to create the conventional CMA-ES, CMA-ES with the alternate step-size adaptation and many other variants proposed over the years. In total, 4 608 different configurations are possible where most configurations are of complementary nature. In this proof-of-concept work, we consider a subset of 32 possible configurations. The developed method is evaluated against an excerpt of BBOB functions and its performance is compared against baselines that are commonly used in automated algorithm selection - the best standalone algorithm (configuration) and the best obtainable sequence of configurations. While the results indicate that the use of the fitness map is not superior on every benchmark problem, it indubitably shows its merit on more hard-to-solve problems. This offers a promising perspective for generalizing to other types of optimization problems and problem domains.","lang":"eng"}],"publication":"2021 IEEE Symposium Series on Computational Intelligence (SSCI)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"819"}],"user_id":"15504","_id":"46315"},{"title":"RP-Mod & RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets","date_updated":"2024-06-07T07:13:04Z","date_created":"2023-08-04T07:22:59Z","author":[{"first_name":"Dennis","last_name":"Assenmacher","full_name":"Assenmacher, Dennis"},{"last_name":"Niemann","full_name":"Niemann, Marco","first_name":"Marco"},{"first_name":"Kilian","full_name":"Müller, Kilian","last_name":"Müller"},{"first_name":"Moritz","id":"105520","full_name":"Seiler, Moritz","last_name":"Seiler"},{"full_name":"Riehle, Dennis M.","last_name":"Riehle","first_name":"Dennis M."},{"first_name":"Heike","full_name":"Trautmann, Heike","id":"100740","orcid":"0000-0002-9788-8282","last_name":"Trautmann"}],"year":"2021","place":"Virtual Event","page":"1–14","citation":{"short":"D. Assenmacher, M. Niemann, K. Müller, M. Seiler, D.M. Riehle, H. Trautmann, in: Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021), Virtual Event, 2021, pp. 1–14.","mla":"Assenmacher, Dennis, et al. “RP-Mod &#38; RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets.” <i>Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)</i>, 2021, pp. 1–14.","bibtex":"@inproceedings{Assenmacher_Niemann_Müller_Seiler_Riehle_Trautmann_2021, place={Virtual Event}, title={RP-Mod &#38; RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets}, booktitle={Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)}, author={Assenmacher, Dennis and Niemann, Marco and Müller, Kilian and Seiler, Moritz and Riehle, Dennis M. and Trautmann, Heike}, year={2021}, pages={1–14} }","apa":"Assenmacher, D., Niemann, M., Müller, K., Seiler, M., Riehle, D. M., &#38; Trautmann, H. (2021). RP-Mod &#38; RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets. <i>Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)</i>, 1–14.","chicago":"Assenmacher, Dennis, Marco Niemann, Kilian Müller, Moritz Seiler, Dennis M. Riehle, and Heike Trautmann. “RP-Mod &#38; RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets.” In <i>Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)</i>, 1–14. Virtual Event, 2021.","ieee":"D. Assenmacher, M. Niemann, K. Müller, M. Seiler, D. M. Riehle, and H. Trautmann, “RP-Mod &#38; RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets,” in <i>Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)</i>, 2021, pp. 1–14.","ama":"Assenmacher D, Niemann M, Müller K, Seiler M, Riehle DM, Trautmann H. RP-Mod &#38; RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets. In: <i>Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)</i>. ; 2021:1–14."},"language":[{"iso":"eng"}],"_id":"46312","department":[{"_id":"34"},{"_id":"819"}],"user_id":"15504","abstract":[{"lang":"eng","text":"Abuse and hate are penetrating social media and many comment sections of news media companies. These platform providers invest considerable efforts to mod- erate user-generated contributions to prevent losing readers who get appalled by inappropriate texts. This is further enforced by legislative actions, which make non-clearance of these comments a punishable action. While (semi-)automated solutions using Natural Language Processing and advanced Machine Learning techniques are getting increasingly sophisticated, the domain of abusive language detection still struggles as large non-English and well-curated datasets are scarce or not publicly available. With this work, we publish and analyse the largest annotated German abusive language comment datasets to date. In contrast to existing datasets, we achieve a high labelling standard by conducting a thorough crowd-based an- notation study that complements professional moderators’ decisions, which are also included in the dataset. We compare and cross-evaluate the performance of baseline algorithms and state-of-the-art transformer-based language models, which are fine-tuned on our datasets and an existing alternative, showing the usefulness for the community."}],"status":"public","publication":"Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)","type":"conference"}]
